Adobe Commerce 2.3.7-p2 is a security-only release that provides security fixes that enhance your Adobe Commerce 2.3.7 or Magento Open Source 2.3.7 deployment. Merchants can now install time-sensitive security fixes without applying the hundreds of functional fixes and enhancements that a full quarterly release provides. Patch 2.3.7-p2 is a security-only patch that provides fixes for vulnerabilities that have been identified in our previous quarterly release, Adobe Commerce 2.3.7-p1.
PHP 7.3 reaches end of support in December 2021, and Adobe Commerce 2.3.x and Magento Open Source 2.3.x reaches end of support in April 2022. We strongly recommend planning your upgrade now to Adobe Commerce 2.4.x or Magento Open Source 2.4.x deployment to help maintain PCI compliance.
Quarterly releases may contain backward-incompatible changes (BIC). To review minor backward-incompatible changes, see BIC reference. (Major backward-incompatible issues are described in BIC highlights. Not all releases introduce major BICs.)
What’s in this release?
Six security fixes and several security enhancements are included in this security patch. Only one of these six fixes is an externally reported vulnerability. Fixes for externally reported vulnerabilities are documented in the Adobe Security Bulletin.
Security-only patches typically include all hotfixes that have been released for the preceding complete release. This release incorporates the two hotfixes that have been released for Adobe Commerce 2.3.7-p1 and Magento Open Source 2.3.7-p1. See Adobe Commerce 2.3.7-p1 Release Notes for information about these hotfixes.
Resolution of known issues in Adobe Commerce 2.3.7-p1
This release includes fixes for the following known issues, which were first identified in Adobe Commerce 2.3.7-p1:
PHP fatal error on upgrade. This issue was previously addressed by patch
AC-384__Fix_Incompatible_PHP_Method__2.3.7-p1_ce.patch to address PHP fatal error on upgrade.
Previously placed order price is displayed when a shopper tries to place an order with a different product using the PayPal payment method. This issue was previously addressed by patch
Adobe Commerce 2.3.7-p1 known issue outdated order total for PayPal.
Session IDs have been removed from the database. This code change may result in breaking changes if merchants have customizations or installed extensions that use the raw session IDs stored in the database.
Restricted admin access to Media Gallery folders. Default Media Gallery permissions now allow only directory operations (view, upload, delete, and create) that are explicitly allowed by configuration. Admin users can no longer access media assets through the Media Gallery that were uploaded outside of the
wysiwyg directories. Administrators who want to access media assets must move them to an explicitly allowed folder or adjust their configuration settings. See Modify Media Library folder permissions.
Lowered limits to GraphQL query complexity. The GraphQL maximum allowed query complexity has been lowered to prevent Denial-of-Service (DOS) attacks. See GraphQL security configuration.
Recent penetration test vulnerabilities have been fixed in this release.
The Content Security Policy directive
frame-ancestors now supports the source expression
Issue: Adobe Stock images uploaded into the
<install_dir>/pub/media/catalog directories are not visible in the Media Gallery. Workaround: To view and work with these images, delete them from the filesystem directories and re-upload them into an allowed Media Gallery directory. See the Stock images not displayed, Adobe Commerce and Magento Open Source 2.3.7-p2 Knowledge Base article.
Installation and upgrade instructions
For instructions on downloading and applying security-only patches (including patch 2.3.7-p2), see Quick start install.
For general information about security-only patches, see the Magento DevBlog post Introducing the New Security-only Patch Release.